US5214703A - Device for the conversion of a digital block and use of same - Google Patents

Device for the conversion of a digital block and use of same Download PDF

Info

Publication number
US5214703A
US5214703A US07/781,235 US78123592A US5214703A US 5214703 A US5214703 A US 5214703A US 78123592 A US78123592 A US 78123592A US 5214703 A US5214703 A US 5214703A
Authority
US
United States
Prior art keywords
block
output
output block
operation unit
subblock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US07/781,235
Other languages
English (en)
Inventor
James L. Massey
Xuejia Lai
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nagravision SARL
Original Assignee
Ascom Tech AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=4216333&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US5214703(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Ascom Tech AG filed Critical Ascom Tech AG
Assigned to ASCOM TECH AG reassignment ASCOM TECH AG ASSIGNMENT OF ASSIGNORS INTEREST. Assignors: LAI, XUEJIA, MASSEY, JAMES L.
Application granted granted Critical
Publication of US5214703A publication Critical patent/US5214703A/en
Assigned to NAGRAVISION S.A. reassignment NAGRAVISION S.A. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ASCOM (SCHWEIZ) AG
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the invention is directed to a device for the block-by-block conversion of a first digital block into a second digital block using at least one freely selectable control block, each of the blocks having an equal number of digits.
  • DES Data Encryption Standard
  • NSS National Bureau of Standards
  • Every plaintext block has a length of 64 bits, as does the ciphertext block.
  • the transmission of the ciphertext block is effected via a public network.
  • This kind of block encryption will make use of all known encryption techniques of confusion, diffusion, etc. and, above all, will use a longer key providing first input means for receiving at least two initial subblocks, wherein the initial digital block is subdivided to form the initial subblocks. Each of the initial subblocks have m digits.
  • a second input means is provided for receiving at least two control blocks, each control block also having m digits.
  • Logic means perform serial operations of at least two different types upon the initial subblocks and the control blocks.
  • the logic means include at least four operation units, each having first and second inputs for receiving blocks to be operated upon and an output for sending an output block resulting from the logical operation performed.
  • the blocks operated upon and the output block each have m digits.
  • the blocks operated upon by the operation units include the initial subblocks, the control blocks, and the output blocks.
  • the majority of the operation units are arranged so that the operation unit which operates upon the output block of a previous operation unit performs an operation different from that of the previous operation unit.
  • the operation units perform the operations selected from and and .
  • Output means are provided for transmitting at least two final subblocks, the final subblocks forming the assigned final digital block, wherein the final subblocks are converted blocks which correspond to the initial subblocks.
  • FIG. 1 shows a basic block wiring diagram of a device for the transmission of data in encrypted form
  • FIG. 2 shows a block wiring diagram of an encrypter
  • FIG. 3 shows a block wiring diagram of a primary encryption logic
  • FIG. 4 shows a truth table of operation units of a first kind
  • FIG. 5 shows a truth table of operation units of a second kind
  • FIG. 6 shows a block wiring diagram of an extended encryption logic
  • FIG. 7 shows a truth table of operation units of a third kind
  • FIG. 8 shows a block wiring diagram of a supplementary encryption logic
  • FIG. 9 shows a block wiring diagram of an encryption stage
  • FIG. 10 shows a table of key subblocks and decryption subblocks
  • FIG. 11 shows a block wiring diagram of a second supplementary encryption logic
  • FIG. 12 shows a block wiring diagram of a second encryption stage
  • FIG. 13 shows a block wiring diagram of a second encrypter
  • FIG. 14 shows a second table of key subblocks and decryption subblocks.
  • FIG. 1 shows a basic block wiring diagram of a device for the transmission of data in encrypted form.
  • the data (plaintext X) to be transmitted originate in a message source 11, e.g. a computer. These data are encrypted in an encrypter 12 and transmitted as ciphertext Y on a public network transmission line 13.
  • the ciphertext Y reaches a decrypter 14 on the receiver side which feeds it to a destination 15, e.g. a second computer, in decrypted form.
  • the encrypter 12 and the decrypter 14 use a secret key block Z which is provided by means f a key source 16 and supplied via secure channel 17 to the two units 12, 14.
  • This channel 17 is e.g. a courier with sealed cover.
  • the ciphertext Y on the transmission line 13 is always exposed to the risk that an enemy cryptanalyst 19 will also read this text Y and attempt to obtain the assigned plaintext X or the key block Z (The results of these attempts are designated X and Z).
  • the cipher should be resistant to these attempts in principle, at least for a sufficient length of time.
  • FIG. 2 shows a block wiring diagram of the encrypter 12 in the case of a step-by-step block encryption.
  • the plaintext X to be encrypted arrives continuously from the message source 11 and reaches an input unit 21, e.g. a series/parallel converter in the case of a serial bit stream.
  • These plaintext subblocks of the respective plaintext blocks X reach a first encryption stage 61.1 via first inputs 25 to 28, each consisting of sixteen parallel lines.
  • the subblocks X 1 to X 4 are grouped together with six different control blocks by means of suitable logical functions.
  • the (general) control blocks are (special) key subblocks Z 1 to Z 6 , and during the decryption process they are decryption subblocks U 1 to U 6 , which are derived from the key block Z. This will be discussed in more detail later.
  • the encryption process is described primarily in the following, for which reason the term key subblock is preferred.
  • the key subblocks Z 1 to Z 6 are connected to second inputs 29, 30, 32, 33, 49, 52 of the first encryption stage 61.1. They, as well as additional key subblocks Z 7 to Z 52 , are delivered by a key subblock generation unit 63.
  • the method for obtaining the key subblocks Z 1 to Z 8 from the key block Z consists in that the latter is divided into eight identical parts of 16 bits length each.
  • the 128 bits of the key block Z are then cyclically shifted (cyclically exchanged) by 25 bits in a uniform direction, e.g. to the left, and the new sequence of 128 bits which is thus formed is, in turn, divided into eight identical parts for forming the key subblocks Z 9 to Z 16 , and so forth, until the formation of Z 52 .
  • Every key subblock Z 1 to Z 52 accordingly has a (second) length m of 16 bits, is derived in an unequivocal manner from the key block Z and is generally distinguished from every other key subblock.
  • the key subblocks Z 1 to Z 6 are connected to the aforementioned six second inputs 29, 30, 32, 33, 49, 52 of the first encryption stage 61.1.
  • the first intersubblocks W 11 to W 14 are connected to the connections or inputs 35 to 38 (identical to the outputs of the preceding stage 61.1) of a second encryption stage 61.2 for the second encryption step.
  • This encryption stage 61.2 is constructed so as to be identical to the first encryption stage 61.1.
  • the described key subblocks Z 7 to Z 12 are connected to their six second key inputs, and the second intersubblocks W 21 , W 22 , W 23 , W 24 or the second interblock W 2 , in its entirety, appear at their outputs.
  • the second intersubblocks W 21 to W 24 are connected to a third encryption stage, not shown, for the third encryption step; the third intersubblocks W 31 to W 34 are connected to a fourth encryption stage, etc. up to a ninth encryption stage 69 which is different from the preceding stages and comprises four second inputs 129, 130, 132, 133.
  • This ciphertext block Y is converted in an output unit 79, e.g. a parallel/series converter, in such a way that it can be transmitted on the transmission line 13.
  • the encryption process is accordingly effected in nine successive encryption stages 61.1, 61.2, 69, the first eight of which are identical.
  • the total of fifty-two aforementioned different key subblocks Z 1 to Z 52 serve as a key.
  • the encryption unit 60 necessary for the encryption process X ⁇ Y is indicated in a dashed line in FIG. 2.
  • the encryption stages 61.1, 61.2, 69 can be realized in various ways.
  • a so-called software implementation in which one or more processors work according to a predetermined program.
  • each input e.g. the first inputs 25 to 28
  • a hardware implementation can also be provided in which the logical function elements are in the form of independent circuit units. The latter are then either constructed from discrete chip elements or preferably from several largescale integration modules (very large scale integration VLSI).
  • VLSI very large scale integration
  • all lines of all inputs are preferably processed in parallel.
  • a partial series procedure is also possible in this case in that e.g. the different inputs (e.g. 25 to 28) are serially connected to partial central circuit units via multiplexers.
  • the hardware implementation has the advantage over the software implementation that it can work substantially faster, specifically up to clock frequencies of approximately 100 Mbits/s and more. For this reason and for purposes of description, the hardware implementation for the encryption stages 61.1, 61.2, 69 is emphasized in the following.
  • FIG. 3 shows the block wiring diagram of a primary encryption logic 40.
  • This logic comprises four operation units 41 to 44 of two different kinds which are connected with one another by means of three connections 45 to 47, the last (47) of which simultaneously forms an output of the logic 40.
  • Every operation unit 41 to 44 has two inputs and an output. Every input and output is constructed as a 16-bit parallel input or output, to which a 16-bit block is connected in a bit-parallel manner.
  • the operation units 41 to 44 are constructed for the logical joining of two input blocks E 1 , E 2 , in each instance, and for forming an assigned output block A of 16 bits.
  • the operation units are connected one after the other in four stages, wherein the two kinds of units 41 to 44 alternate.
  • the operation units of the first kind i.e. the units 42 and 44, have the following characteristics: these units interpret every input block E 1 , E 2 as an integer in binary representation, wherein this number belongs to the number set or set ⁇ 0, 1, 2, . . . , (2 m -1) ⁇ (the number m (second length) is preferably the number 16, but can also be 4 or 8).
  • the units 42, 44 then form the sum modulo 2 m from the input blocks E 1 , E 2 and deliver a corresponding output block A.
  • the operation units 42, 44 of the first kind are accordingly adder modulo 2 m .
  • the two input blocks E 1 , E 2 and the output block A are delivered, respectively, as a number in binary and decimal representation.
  • the respective output block A is then the product modulo (2 m +1) of the input blocks E 1 , E 2 .
  • the units 41, 43 are accordingly multiplier modulo (2 m +1).
  • the primary encryption logic 40 effects a very good diffusion, since each of its two output blocks a 1 , a 2 depends on the two input blocks e 1 , e 2 and on the two key subblocks Z 5 , Z 6 , that is on the values at all inputs. It can be proved that the quantity of four operations is a minimum for meeting the object of diffusion. The aforementioned use of operation units of different kinds serves to produce the necessary confusion.
  • FIG. 6 shows the block wiring diagram of an extended encryption logic 140.
  • This encryption logic comprises four first inputs 125 to 128 for four input blocks e 5 to e 8 to be encrypted in a parallel manner, four outputs 35 to 38 for delivering four output blocks a 5 to a 8 , and two second inputs 49, 52, which have already been mentioned, for the input of two key subblocks Z 5 , Z 6 .
  • the core of the extended encryption logic 140 is formed by the primary logic 40, which was already described. This is supplemented by six operation units 115 to 120 of a third kind , specifically in such a way that the input 125 leads the units 115 and 117, the input 126 leads to the units 116 and 118, the input 127 leads to the units 115 and 119, the input 128 leads to the units 116 and 120, the outputs of the units 15 and 116 form the inputs 50 and 51, respectively, of the logic 40, the outputs 47, 48 of the logic 40 form the inputs of the units 117, 119 and 118, 120, respectively, and the outputs of the units 117 to 120 form the outputs 35 to 38.
  • the extended encryption logic 140 is constructed in such a way that every output 35 to 38 depends on all inputs 125 to 128 and 49, 52, that operation units of different kinds , , follow one another and the characteristic of the involution is given.
  • This last characteristic means that the extended encryption logic 140 is a self-inverse function for the blocks e 5 to e 8 connected to their first inputs 125 to 128, specifically for every given pair of key subblocks Z 5 , Z 6 .
  • Bit-by-bit exclusive-OR is preferably used as operation units 115 to 120 of the third kind .
  • FIG. 8 shows the block wiring diagram of a supplementary encryption logic 240.
  • the latter comprises two operation units 111, 112 of the second kind and two operation units 113, 114 of the first kind .
  • the outputs of the logic 240 are identical to the outputs 135 to 138 of the operation units 111 to 114.
  • FIG. 9 shows the block wiring diagram of one of the first eight identical encryption stages of FIG. 2, e.g. the first stage 61.1. Accordingly, this encryption stage is formed from the combination of a supplementary encryption logic 240 and an extended encryption logic 140, wherein the outputs 135 to 138 of the logic 240 are directly (galvanically) connected with the inputs 125 to 128 of the following logic 140.
  • the inputs 25 to 28 of the respective encryption stage (61.1) are identical to the inputs 225 to 228 of the supplementary encryption logic 240.
  • the outputs of the extended logic 140 when crossed, form the outputs 35 to 38 of the encryption stage 61.1.
  • Six key subblocks e.g.
  • blocks Z 1 to Z 6 are connected to the second inputs 29, 30, 32, 33, 49, 52, and either four plaintext subblocks X 1 to X 4 or four intersubblocks W n1 to W n4 are connected to the first inputs 25 to 28.
  • the ninth encryption stage 69 corresponds exclusively to the supplementary encryption logic 240, wherein the four outputs 135 to 138 of this logic 240 are identical to the four outputs 75 to 78 of the encryption stage 69.
  • the encryption unit 60 (FIG. 2), as overall logic for the encryption of plaintext blocks X which correspond to a sequence of 64 bits in each instance, comprises the following characteristics as a whole:
  • It comprises four first inputs 25 to 28, fifty-two second inputs 28, 29, 30, 32, 33, 49, 52 and four outputs 75 to 78.
  • It comprises eight identical encryption stages 61.1, 61.2, plus another encryption stage 69.
  • It comprises one hundred and sixteen operation units of a total of three different kinds , , .
  • the kinds , , of successive operations alternate in general and continuously in the flow direction of the logical operations.
  • Every block at the outputs 75 to 78 is dependent on all blocks at the first inputs 25 to 28 and on almost all blocks at the second inputs 29, 30, 32, 33, 49, 52, on a total of fifty-three blocks. (The output blocks of three respective blocks connected to the second inputs 129, 130, 132, 133 of the ninth encryption stage 69 are not dependent.)
  • every bit of every block W.sub.(n+1)1 to W.sub.(n+1)4 at the outputs 35 to 38 is dependent on all bits of all blocks W n1 to W n4 and Z n at the first (25 to 28) and second inputs 29, 30, 32, 33, 49, 52, respectively.
  • an encryption unit 60 can serve either for the encryption of a plaintext block X or for the decryption of a ciphertext block Y.
  • the unit 60 can accordingly be used for the encryption process X ⁇ Y as well as for the decryption process Y ⁇ X.
  • FIG. 10 no shows fifty-two decryption subblocks U 1 to U 52 which are used for the decryption process Y ⁇ X, specifically in comparison to the key subblocks Z 1 to Z 52 and in relation to these key subblocks and to the nine encryption stages 61.1, 61.2, 69 (FIG. 2).
  • the key subblocks Z 1 to Z 6 are used in the first stage, the blocks Z 7 to Z 12 are used in the second stage, and so on. Finally, in the ninth stage, blocks Z 49 to Z 52 are used.
  • Z -1 j modulo (2 16 +1) multiplied by Z j is 1. Further, -Z j modulo 2 16 added to Z j is 0.
  • the invention allows a large number of variants. Some of these are listed as follows:
  • the different kinds of operation units 41 to 44, 111 to 114, 115 to 120 are divided differently in the various aforementioned logics 40, 240, 140.
  • the operation units of the two kinds are exchanged in the primary encryption logic 40.
  • the first two decryption subblocks of every stage i are identical to the modulo (2 m +1) multiplication inverses of the first or second key subblock of the first or second key subblock in the (S-i+2)th stage of the encryption process,
  • the fifth and sixth decryption subblocks in the ith stage are identical to the fifth and sixth key subblock, respectively, in the (S-i+1)th stage of the encryption process.
  • the derivation of the key subblocks Z 1 to Z 52 from the key subblock Z is effected according to a method other than that described.
  • the construction of the encryption unit 60 is effected predominantly with the use of discrete operation units 41 to 44, 111 to 114, 115 to 120 as special logic units (hardware implementation), predominantly with the use of commercially available processors and storages, which work according to an assigned program (software implementation) or in mixed construction.
  • Each of the described logics 40, 140, 240, 60, 61.1, 61.2, 69 can be conceived as a "black box" with first and second inputs and outputs.
  • Each of these logics converts the two or four first subblocks connected to the first inputs into assigned second subblocks of the same length which can be tapped at the outputs.
  • the conversion process is influenced by the key subblocks connected to the second inputs or in general by suitable control blocks. Parallel inputs and outputs are advantageous if higher working speeds are desired.
  • An individual first and second input and an individual single output are preferably to be provided for said software implementation, the assigned input and output blocks being inputted and outputted serially by means of them.
  • the (second) length m be either 4, 8 or preferably 16 bits.
  • the encryption logics 40, 140, 240 can be constructed from VLSI semiconductor modules (VLSI very large scale integration) and can accordingly be inexpensively produced.
  • FIGS. 11 to 14 are modifications of FIGS. 8, 9, 2 and 10.
  • FIG. 11 shows the block wiring diagram of a second supplementary encryption logic 240v.
  • the latter comprises two operation units 111v, 114v of the second kind and two operation units 112v, 113v of the first kind .
  • the outputs of the logic 240 are identical to the outputs 135 to 138 of the operation units 111v to 114v.
  • FIG. 12 shows the block wiring diagram of a second encryption stage 61.1v.
  • the latter is formed from the combination of the supplementary encryption logic 240v and an extended encryption logic 140, wherein the outputs 135 to 138 of the logic 240v are (galvanically) connected directly with the inputs 125 to 128 of the following logic 140.
  • the inputs 25 to 28 of the respective encryption stage (61.1v) are identical to the inputs 225 to 228 of the second, supplementary encryption logic 240v.
  • the outputs of the extended logic 140 directly form the outputs 35 to 38 and, when crossed, the outputs 36 and 37 of the encryption stage 61.1v.
  • the remaining construction corresponds completely to that of FIG. 9.
  • FIG. 13 shows the block wiring diagram of a second encryption unit 60v which corresponds to a great extent to FIG. 2.
  • Eight identical second encryption stages 61.1v, 61.2v are connected one after the other in this instance, a second, supplementary encryption logic 240v being connected subsequent to the latter as last stage 69v.
  • the inputs W 82 and W 83 are connected in a crossed manner with . . . W 22 and . . . W 23 , respectively.
  • FIG. 14 shows a second table of key subblocks Z n and decryption subblocks U n , corresponding to FIG. 10.
  • Z -1 j modulo (2 16 +1) multiplied by Z j is 1.
  • -Z j modulo 2 16 added to Z j is 0.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Transmission Systems Not Characterized By The Medium Used For Transmission (AREA)
US07/781,235 1990-05-18 1991-05-16 Device for the conversion of a digital block and use of same Expired - Lifetime US5214703A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CH169090 1990-05-18
CH01690/90 1990-05-18

Publications (1)

Publication Number Publication Date
US5214703A true US5214703A (en) 1993-05-25

Family

ID=4216333

Family Applications (1)

Application Number Title Priority Date Filing Date
US07/781,235 Expired - Lifetime US5214703A (en) 1990-05-18 1991-05-16 Device for the conversion of a digital block and use of same

Country Status (6)

Country Link
US (1) US5214703A (ja)
EP (1) EP0482154B1 (ja)
JP (1) JP3225440B2 (ja)
ES (1) ES2042346T3 (ja)
HK (1) HK1003338A1 (ja)
WO (1) WO1991018459A2 (ja)

Cited By (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5530722A (en) * 1992-10-27 1996-06-25 Ericsson Ge Mobile Communications Inc. Quadrature modulator with integrated distributed RC filters
US5615268A (en) * 1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US5675653A (en) * 1995-11-06 1997-10-07 Nelson, Jr.; Douglas Valmore Method and apparatus for digital encryption
US5727062A (en) * 1995-07-06 1998-03-10 Ritter; Terry F. Variable size block ciphers
US5748738A (en) * 1995-01-17 1998-05-05 Document Authentication Systems, Inc. System and method for electronic transmission, storage and retrieval of authenticated documents
WO1998040984A1 (en) * 1997-03-11 1998-09-17 Qualcomm Incorporated Method of and apparatus for encrypting signals for transmission
US5825886A (en) * 1995-12-08 1998-10-20 Entrust Technologies Ltd. Construction symmetric ciphers using the cast design procedure
EP0940943A2 (en) * 1998-03-06 1999-09-08 Harris Corporation Method and apparatus for data encryption
US6011847A (en) * 1995-06-01 2000-01-04 Follendore, Iii; Roy D. Cryptographic access and labeling system
US6038317A (en) * 1997-12-24 2000-03-14 Magliveras; Spyros S. Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2l
US6152824A (en) * 1997-03-06 2000-11-28 Mpath Interactive, Inc. Online gaming architecture
WO2001017152A1 (en) * 1999-08-27 2001-03-08 Coppe/Ufrj - Coordenacão Dos Programas De Pós Graduacão De Engenharia Da Universidade Federal Do Rio De Janeiro A method for the hardware implementation of the idea cryptographic algorithm - hipcrypto
US6237096B1 (en) 1995-01-17 2001-05-22 Eoriginal Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US20010002485A1 (en) * 1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US20010053221A1 (en) * 2000-06-20 2001-12-20 Casio Computer Co., Ltd. Ciphering apparatus and ciphering method
US6345101B1 (en) 1998-10-07 2002-02-05 Jayant Shukla Cryptographic method and apparatus for data communication and storage
US20020016913A1 (en) * 2000-08-04 2002-02-07 Wheeler Lynn Henry Modifying message data and generating random number digital signature within computer chip
US6351539B1 (en) 1998-09-18 2002-02-26 Integrated Device Technology, Inc. Cipher mixer with random number generator
US20020026575A1 (en) * 1998-11-09 2002-02-28 Wheeler Lynn Henry Account-based digital signature (ABDS) system
US20020032860A1 (en) * 1998-11-09 2002-03-14 Wheeler Anne Mcafee Account authority digital signature
US20020108034A1 (en) * 2001-02-02 2002-08-08 Tony Hashem System and method for automatically securing data for transmission
US20030014372A1 (en) * 2000-08-04 2003-01-16 Wheeler Lynn Henry Trusted authentication digital signature (tads) system
US20030086564A1 (en) * 2001-09-05 2003-05-08 Kuhlman Douglas A. Method and apparatus for cipher encryption and decryption using an s-box
US20030097573A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Central Key Authority Database in an ABDS System
US20030097561A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System
US20030115151A1 (en) * 2000-08-04 2003-06-19 Wheeler Lynn Henry Person-centric account-based digital signature system
US20030126439A1 (en) * 2000-08-04 2003-07-03 First Data Corporation ABDS System Utilizing Security Information in Authenticating Entity Access
US20030191811A1 (en) * 2002-04-05 2003-10-09 Tony Hashem Method and system for transferring files using file transfer protocol
US20030204717A1 (en) * 2002-04-30 2003-10-30 Microsoft Corporation Methods and systems for frustrating statistical attacks by injecting pseudo data into a data system
US20040005051A1 (en) * 2000-08-04 2004-01-08 Wheeler Lynn Henry Entity authentication in eletronic communications by providing verification status of device
US20040030901A1 (en) * 2000-08-04 2004-02-12 Lynn Henry Wheeler Linking public key of device to information during manufacture
US20040093493A1 (en) * 1995-01-17 2004-05-13 Bisbee Stephen F. System and method for electronic transmission, storage and retrieval of authenticated documents
US20040128508A1 (en) * 2001-08-06 2004-07-01 Wheeler Lynn Henry Method and apparatus for access authentication entity
US20040133699A1 (en) * 2002-12-04 2004-07-08 Tony Hashem System and method for performing data transfer
US20040158704A1 (en) * 2003-02-12 2004-08-12 Avaya Technology Corp. Providing encrypted real time data transmissions on a network
US6813354B1 (en) * 2000-03-09 2004-11-02 Lucent Technologies Inc. Mixing in small batches
EP1077554B1 (en) * 1998-05-07 2004-11-17 Angel José Ferre Herrero Randomization-encryption system
US20040247117A1 (en) * 2003-05-23 2004-12-09 Serge Vaudenay Device and method for encrypting and decrypting a block of data
US6845159B1 (en) 1998-10-07 2005-01-18 Protego Information Ab Processing method and apparatus for converting information from a first format into a second format
US20050152538A1 (en) * 2004-01-08 2005-07-14 Encryption Solutions, Inc. Method of encrypting and transmitting data and system for transmitting encrypted data
US20050152550A1 (en) * 2004-01-08 2005-07-14 Encryption Solutions, Inc. System for transmitting encrypted data
US20050175176A1 (en) * 2004-02-09 2005-08-11 Microsoft Corporation Primitives for fast secure hash functions and stream ciphers
US6957330B1 (en) 1999-03-01 2005-10-18 Storage Technology Corporation Method and system for secure information handling
US20060059189A1 (en) * 2004-09-15 2006-03-16 Peter Dunki Generation of updatable anonymized data records for testing and developing purposes
US20060059149A1 (en) * 2004-09-15 2006-03-16 Peter Dunki Generation of anonymized data records from productive application data
US7103180B1 (en) * 2001-10-25 2006-09-05 Hewlett-Packard Development Company, L.P. Method of implementing the data encryption standard with reduced computation
US20070087829A1 (en) * 2005-10-14 2007-04-19 Derek Liu Multi-player game architecture
US20070116273A1 (en) * 2001-06-29 2007-05-24 Harris Corporation Method and apparatus for data encryption
US20080024332A1 (en) * 2006-07-27 2008-01-31 George Simonson Method and Apparatus for Protecting Data
US20080040603A1 (en) * 2004-01-08 2008-02-14 Encryption Solutions, Inc. Multiple level security system and method for encrypting data within documents
US20080165965A1 (en) * 2007-01-05 2008-07-10 John Almeida Method of two strings private key (symmetric) encryption and decryption algorithm
US20080292096A1 (en) * 2007-05-25 2008-11-27 Schneider James P Hybrid data encryption
DE102005026943B4 (de) * 2004-06-07 2009-01-29 Rockwell Electronic Commerce Corp., Wood Dale Verfahren und System zur sicheren Kundenkommunikation
US20090060180A1 (en) * 2007-08-29 2009-03-05 Red Hat, Inc. Method and an apparatus to generate pseudo random bits for a cryptographic key
US20090060179A1 (en) * 2007-08-29 2009-03-05 Red Hat, Inc. Method and an apparatus to generate pseudo random bits from polynomials
US7508945B1 (en) * 1999-05-18 2009-03-24 Ferre Herrero Angel Jose Self-corrector randomisation-encryption and method
US20090214024A1 (en) * 2008-02-21 2009-08-27 Schneider James P Block cipher using multiplication over a finite field of even characteristic
US20090220083A1 (en) * 2008-02-28 2009-09-03 Schneider James P Stream cipher using multiplication over a finite field of even characteristic
US20090292751A1 (en) * 2008-05-22 2009-11-26 James Paul Schneider Non-linear mixing of pseudo-random number generator output
US20100135486A1 (en) * 2008-11-30 2010-06-03 Schneider James P Nonlinear feedback mode for block ciphers
US8588412B2 (en) 2008-05-23 2013-11-19 Red Hat, Inc. Mechanism for generating pseudorandom number sequences
US20130315394A1 (en) * 2012-05-25 2013-11-28 Wistron Corporation Data encryption method, data verification method and electronic apparatus
US10536445B1 (en) 2017-06-12 2020-01-14 Daniel Maurice Lerner Discrete blockchain and blockchain communications
US10579793B2 (en) 2017-06-12 2020-03-03 Daniel Maurice Lerner Managed securitized containers and container communications
US10650139B2 (en) 2017-06-12 2020-05-12 Daniel Maurice Lerner Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers
US10764282B2 (en) 2017-06-12 2020-09-01 Daniel Maurice Lerner Protected and secured user-wearable devices for assured authentication and validation of data storage and transmission that utilize securitized containers
US10957445B2 (en) 2017-10-05 2021-03-23 Hill-Rom Services, Inc. Caregiver and staff information system

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2728981A1 (fr) * 1994-12-28 1996-07-05 Gemplus Card Int Procede pour la mise en oeuvre d'un protocole de communication a cle privee entre deux dispositifs de traitement
US6269163B1 (en) * 1998-06-15 2001-07-31 Rsa Security Inc. Enhanced block ciphers with data-dependent rotations
DE10045463A1 (de) * 2000-09-11 2002-03-28 Ammar Alkassar Selbstsynchronisierende Stromchiffre zur Streckenverschlüsselung über einen fehlerbehafteten Übertragungskanal
JP5073635B2 (ja) * 2008-11-07 2012-11-14 英明 山田 暗号システム、及び暗号プログラム

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4275265A (en) * 1978-10-02 1981-06-23 Wisconsin Alumni Research Foundation Complete substitution permutation enciphering and deciphering circuit
US4668103A (en) * 1982-04-30 1987-05-26 Wilson William J Polygraphic encryption-decryption communications system
US4850019A (en) * 1985-11-08 1989-07-18 Nippon Telegraph And Telephone Corporation Data randomization equipment
US5020106A (en) * 1989-02-08 1991-05-28 Gretag Aktiengesellschaft Process for the cryptographic processing of data and cryptographic systems

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4255811A (en) * 1975-03-25 1981-03-10 International Business Machines Corporation Key controlled block cipher cryptographic system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4275265A (en) * 1978-10-02 1981-06-23 Wisconsin Alumni Research Foundation Complete substitution permutation enciphering and deciphering circuit
US4668103A (en) * 1982-04-30 1987-05-26 Wilson William J Polygraphic encryption-decryption communications system
US4850019A (en) * 1985-11-08 1989-07-18 Nippon Telegraph And Telephone Corporation Data randomization equipment
US5020106A (en) * 1989-02-08 1991-05-28 Gretag Aktiengesellschaft Process for the cryptographic processing of data and cryptographic systems

Cited By (150)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5530722A (en) * 1992-10-27 1996-06-25 Ericsson Ge Mobile Communications Inc. Quadrature modulator with integrated distributed RC filters
US7162635B2 (en) 1995-01-17 2007-01-09 Eoriginal, Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US5615268A (en) * 1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US20010002485A1 (en) * 1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US6237096B1 (en) 1995-01-17 2001-05-22 Eoriginal Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US5748738A (en) * 1995-01-17 1998-05-05 Document Authentication Systems, Inc. System and method for electronic transmission, storage and retrieval of authenticated documents
US7743248B2 (en) 1995-01-17 2010-06-22 Eoriginal, Inc. System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components
US20040093493A1 (en) * 1995-01-17 2004-05-13 Bisbee Stephen F. System and method for electronic transmission, storage and retrieval of authenticated documents
US6011847A (en) * 1995-06-01 2000-01-04 Follendore, Iii; Roy D. Cryptographic access and labeling system
US5727062A (en) * 1995-07-06 1998-03-10 Ritter; Terry F. Variable size block ciphers
US5675653A (en) * 1995-11-06 1997-10-07 Nelson, Jr.; Douglas Valmore Method and apparatus for digital encryption
US5825886A (en) * 1995-12-08 1998-10-20 Entrust Technologies Ltd. Construction symmetric ciphers using the cast design procedure
US6152824A (en) * 1997-03-06 2000-11-28 Mpath Interactive, Inc. Online gaming architecture
WO1998040984A1 (en) * 1997-03-11 1998-09-17 Qualcomm Incorporated Method of and apparatus for encrypting signals for transmission
US20040190712A1 (en) * 1997-03-11 2004-09-30 Rose Gregory G. Method and apparatus for encrypting data in a wireless communication system
US6768797B2 (en) * 1997-03-11 2004-07-27 Qualcomm, Inc. Method and apparatus for encrypting data in a wireless communication system
US20030185390A1 (en) * 1997-03-11 2003-10-02 Qualcomm, Inc. Method and apparatus for encrypting data in a wireless communication system
US6075859A (en) * 1997-03-11 2000-06-13 Qualcomm Incorporated Method and apparatus for encrypting data in a wireless communication system
US7995751B2 (en) 1997-03-11 2011-08-09 Qualcomm Incorporated Method and apparatus for encrypting data in a wireless communication system
KR100899964B1 (ko) 1997-03-11 2009-05-28 퀄컴 인코포레이티드 송신용 신호의 암호화 방법 및 그 장치
US6385316B1 (en) 1997-03-11 2002-05-07 Qualcomm Incorporated Method and apparatus for encrypting data in a wireless communication system
US6038317A (en) * 1997-12-24 2000-03-14 Magliveras; Spyros S. Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2l
US6108421A (en) * 1998-03-06 2000-08-22 Harris Corporation Method and apparatus for data encryption
EP0940943A2 (en) * 1998-03-06 1999-09-08 Harris Corporation Method and apparatus for data encryption
EP0940943A3 (en) * 1998-03-06 2003-10-01 Harris Corporation Method and apparatus for data encryption
US7050580B1 (en) * 1998-05-07 2006-05-23 Ferre Herrero Angel Jose Randomization-encryption system
EP1077554B1 (en) * 1998-05-07 2004-11-17 Angel José Ferre Herrero Randomization-encryption system
US6351539B1 (en) 1998-09-18 2002-02-26 Integrated Device Technology, Inc. Cipher mixer with random number generator
US6845159B1 (en) 1998-10-07 2005-01-18 Protego Information Ab Processing method and apparatus for converting information from a first format into a second format
US6345101B1 (en) 1998-10-07 2002-02-05 Jayant Shukla Cryptographic method and apparatus for data communication and storage
US7047416B2 (en) 1998-11-09 2006-05-16 First Data Corporation Account-based digital signature (ABDS) system
US20050044373A1 (en) * 1998-11-09 2005-02-24 First Data Corporation Account authority digital signature (aads) system using encoded information
US7257228B2 (en) 1998-11-09 2007-08-14 First Data Corporation Account authority digital signature (AADS) system using encoded information
US8620814B2 (en) 1998-11-09 2013-12-31 First Data Corporation Three party account authority digital signature (AADS) system
US7519821B2 (en) 1998-11-09 2009-04-14 First Data Corporation Account authority digital signature (AADS) system
US20020032860A1 (en) * 1998-11-09 2002-03-14 Wheeler Anne Mcafee Account authority digital signature
US6981154B2 (en) 1998-11-09 2005-12-27 First Data Corporation Account authority digital signature (AADS) accounts
US7549050B2 (en) 1998-11-09 2009-06-16 First Data Corporation Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system
US20020026575A1 (en) * 1998-11-09 2002-02-28 Wheeler Lynn Henry Account-based digital signature (ABDS) system
US6820202B1 (en) 1998-11-09 2004-11-16 First Data Corporation Account authority digital signature (AADS) system
US20020129248A1 (en) * 1998-11-09 2002-09-12 Wheeler Lynn Henry Account-based digital signature (ABDS) system
US20050005123A1 (en) * 1998-11-09 2005-01-06 First Data Corporation Account authority digital signature (aads) system
US20020116608A1 (en) * 1998-11-09 2002-08-22 Wheeler Henry Lynn Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
US20020112160A2 (en) * 1998-11-09 2002-08-15 First Data Dorporation Three Party Account Authority Digital Signature (AADS) System
US6820199B2 (en) 1998-11-09 2004-11-16 First Data Corporation Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
US6957330B1 (en) 1999-03-01 2005-10-18 Storage Technology Corporation Method and system for secure information handling
US7508945B1 (en) * 1999-05-18 2009-03-24 Ferre Herrero Angel Jose Self-corrector randomisation-encryption and method
WO2001017152A1 (en) * 1999-08-27 2001-03-08 Coppe/Ufrj - Coordenacão Dos Programas De Pós Graduacão De Engenharia Da Universidade Federal Do Rio De Janeiro A method for the hardware implementation of the idea cryptographic algorithm - hipcrypto
US6813354B1 (en) * 2000-03-09 2004-11-02 Lucent Technologies Inc. Mixing in small batches
US20010053221A1 (en) * 2000-06-20 2001-12-20 Casio Computer Co., Ltd. Ciphering apparatus and ciphering method
US20030126439A1 (en) * 2000-08-04 2003-07-03 First Data Corporation ABDS System Utilizing Security Information in Authenticating Entity Access
US6938156B2 (en) 2000-08-04 2005-08-30 First Data Corporation ABDS system and verification status for authenticating entity access
US20030097570A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Managing Database for Identifying to Recipients Security Features of Devices Generating Digital Signatures
US7500272B2 (en) 2000-08-04 2009-03-03 First Data Corporation Manufacturing unique devices that generate digital signatures
US20040030901A1 (en) * 2000-08-04 2004-02-12 Lynn Henry Wheeler Linking public key of device to information during manufacture
US20040005051A1 (en) * 2000-08-04 2004-01-08 Wheeler Lynn Henry Entity authentication in eletronic communications by providing verification status of device
US20030014372A1 (en) * 2000-08-04 2003-01-16 Wheeler Lynn Henry Trusted authentication digital signature (tads) system
US20090158029A1 (en) * 2000-08-04 2009-06-18 First Data Corporation Manufacturing unique devices that generate digital signatures
US20030177361A1 (en) * 2000-08-04 2003-09-18 Wheeler Lynn Henry Method and system for using electronic communications for an electronic contract
US7552333B2 (en) 2000-08-04 2009-06-23 First Data Corporation Trusted authentication digital signature (tads) system
US20030131235A1 (en) * 2000-08-04 2003-07-10 First Data Corporation ABDS Method Utilizing Security Information in Authenticating Entity Access
US20030131234A1 (en) * 2000-08-04 2003-07-10 First Data Corporation Account-Based Digital Signature (ABDS) System for Authenticating Entity Access to Controlled Resource
US6851054B2 (en) 2000-08-04 2005-02-01 First Data Corporation Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource
US20030126437A1 (en) * 2000-08-04 2003-07-03 First Data Corporation ABDS Method and Verification Status for Authenticating Entity Access
US6892302B2 (en) 2000-08-04 2005-05-10 First Data Corporation Incorporating security certificate during manufacture of device generating digital signatures
US6915430B2 (en) 2000-08-04 2005-07-05 First Data Corporation Reliably identifying information of device generating digital signatures
US20020016913A1 (en) * 2000-08-04 2002-02-07 Wheeler Lynn Henry Modifying message data and generating random number digital signature within computer chip
US20020023217A1 (en) * 2000-08-04 2002-02-21 Wheeler Lynn Henry Manufacturing unique devices that generate digital signatures
US7784106B2 (en) 2000-08-04 2010-08-24 First Data Corporation Manufacturing unique devices that generate digital signatures
US20030097562A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Managing Database for Reliably Identifying Information of Device Generating Digital Signatures
US6950940B2 (en) 2000-08-04 2005-09-27 First Data Corporation ABDS method utilizing security information in authenticating entity access
US6952773B2 (en) 2000-08-04 2005-10-04 First Data Corporation Requesting execution of instructions on accounts in ABDS system
US6957336B2 (en) 2000-08-04 2005-10-18 First Data Corporation Establishing initial PuK-linked account database
US20030126438A1 (en) * 2000-08-04 2003-07-03 First Data Corporation ABDS System and Verification Status for Authenticating Entity Access
US6959381B2 (en) 2000-08-04 2005-10-25 First Data Corporation Central key authority (CKA) database for user accounts in ABDS system
US6978369B2 (en) 2000-08-04 2005-12-20 First Data Corporation Person-centric account-based digital signature system
US20030115463A1 (en) * 2000-08-04 2003-06-19 First Data Corporation Requesting Execution of Instructions on Accounts in ABDS System
US6983368B2 (en) 2000-08-04 2006-01-03 First Data Corporation Linking public key of device to information during manufacture
US7010691B2 (en) 2000-08-04 2006-03-07 First Data Corporation ABDS system utilizing security information in authenticating entity access
US20030097573A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Central Key Authority Database in an ABDS System
US7558965B2 (en) 2000-08-04 2009-07-07 First Data Corporation Entity authentication in electronic communications by providing verification status of device
US7028185B2 (en) 2000-08-04 2006-04-11 First Data Corporation Managing database for identifying to recipients security features of devices generating digital signatures
US20030115151A1 (en) * 2000-08-04 2003-06-19 Wheeler Lynn Henry Person-centric account-based digital signature system
US7047414B2 (en) 2000-08-04 2006-05-16 First Data Corporation Managing database for reliably identifying information of device generating digital signatures
US20030101344A1 (en) * 2000-08-04 2003-05-29 First Data Corporation Establishing Initial PuK-Linked Account Database
US7082533B2 (en) 2000-08-04 2006-07-25 First Data Corporation Gauging risk in electronic communications regarding accounts in ABDS system
US7096354B2 (en) 2000-08-04 2006-08-22 First Data Corporation Central key authority database in an ABDS system
US20030097561A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System
US7143284B2 (en) 2000-08-04 2006-11-28 First Data Corporation ABDS method and verification status for authenticating entity access
US7200749B2 (en) 2000-08-04 2007-04-03 First Data Corporation Method and system for using electronic communications for an electronic contract
US20020108034A1 (en) * 2001-02-02 2002-08-08 Tony Hashem System and method for automatically securing data for transmission
US7613297B2 (en) * 2001-06-29 2009-11-03 Harris Corporation Method and apparatus for data encryption
US20070116273A1 (en) * 2001-06-29 2007-05-24 Harris Corporation Method and apparatus for data encryption
US20070116271A1 (en) * 2001-06-29 2007-05-24 Harris Corporation Method and apparatus for data encryption
US7251326B2 (en) 2001-06-29 2007-07-31 Harris Corporation Method and apparatus for data encryption
US7606368B2 (en) 2001-06-29 2009-10-20 Harris Corporation Method and apparatus for data encryption
US7672455B2 (en) 2001-06-29 2010-03-02 Harris Corporation Method and apparatus for data encryption
US20040128508A1 (en) * 2001-08-06 2004-07-01 Wheeler Lynn Henry Method and apparatus for access authentication entity
US20030086564A1 (en) * 2001-09-05 2003-05-08 Kuhlman Douglas A. Method and apparatus for cipher encryption and decryption using an s-box
US7103180B1 (en) * 2001-10-25 2006-09-05 Hewlett-Packard Development Company, L.P. Method of implementing the data encryption standard with reduced computation
US20030191811A1 (en) * 2002-04-05 2003-10-09 Tony Hashem Method and system for transferring files using file transfer protocol
US7155578B2 (en) 2002-04-05 2006-12-26 Genworth Financial, Inc. Method and system for transferring files using file transfer protocol
US20030204717A1 (en) * 2002-04-30 2003-10-30 Microsoft Corporation Methods and systems for frustrating statistical attacks by injecting pseudo data into a data system
US7376235B2 (en) * 2002-04-30 2008-05-20 Microsoft Corporation Methods and systems for frustrating statistical attacks by injecting pseudo data into a data system
US20040133699A1 (en) * 2002-12-04 2004-07-08 Tony Hashem System and method for performing data transfer
US20040158704A1 (en) * 2003-02-12 2004-08-12 Avaya Technology Corp. Providing encrypted real time data transmissions on a network
US20040247117A1 (en) * 2003-05-23 2004-12-09 Serge Vaudenay Device and method for encrypting and decrypting a block of data
US7499542B2 (en) 2003-05-23 2009-03-03 Nagravision Sa Device and method for encrypting and decrypting a block of data
US20080040603A1 (en) * 2004-01-08 2008-02-14 Encryption Solutions, Inc. Multiple level security system and method for encrypting data within documents
US20050152538A1 (en) * 2004-01-08 2005-07-14 Encryption Solutions, Inc. Method of encrypting and transmitting data and system for transmitting encrypted data
US7526643B2 (en) 2004-01-08 2009-04-28 Encryption Solutions, Inc. System for transmitting encrypted data
US8275997B2 (en) 2004-01-08 2012-09-25 Encryption Solutions, Inc. Method of encrypting and transmitting data and system for transmitting encrypted data
US8031865B2 (en) 2004-01-08 2011-10-04 Encryption Solutions, Inc. Multiple level security system and method for encrypting data within documents
US20050152550A1 (en) * 2004-01-08 2005-07-14 Encryption Solutions, Inc. System for transmitting encrypted data
US7752453B2 (en) 2004-01-08 2010-07-06 Encryption Solutions, Inc. Method of encrypting and transmitting data and system for transmitting encrypted data
US7289629B2 (en) 2004-02-09 2007-10-30 Microsoft Corporation Primitives for fast secure hash functions and stream ciphers
US20050175176A1 (en) * 2004-02-09 2005-08-11 Microsoft Corporation Primitives for fast secure hash functions and stream ciphers
DE102005026943B4 (de) * 2004-06-07 2009-01-29 Rockwell Electronic Commerce Corp., Wood Dale Verfahren und System zur sicheren Kundenkommunikation
US8117219B2 (en) 2004-09-15 2012-02-14 Ubs Ag Generation of updatable anonymized data records for testing and developing purposes
US20060059149A1 (en) * 2004-09-15 2006-03-16 Peter Dunki Generation of anonymized data records from productive application data
US20060059189A1 (en) * 2004-09-15 2006-03-16 Peter Dunki Generation of updatable anonymized data records for testing and developing purposes
US20070087829A1 (en) * 2005-10-14 2007-04-19 Derek Liu Multi-player game architecture
US20080024332A1 (en) * 2006-07-27 2008-01-31 George Simonson Method and Apparatus for Protecting Data
US20080165965A1 (en) * 2007-01-05 2008-07-10 John Almeida Method of two strings private key (symmetric) encryption and decryption algorithm
US7925009B2 (en) * 2007-05-25 2011-04-12 Red Hat, Inc. Hybrid data encryption
US20080292096A1 (en) * 2007-05-25 2008-11-27 Schneider James P Hybrid data encryption
US8265272B2 (en) 2007-08-29 2012-09-11 Red Hat, Inc. Method and an apparatus to generate pseudo random bits for a cryptographic key
US20090060179A1 (en) * 2007-08-29 2009-03-05 Red Hat, Inc. Method and an apparatus to generate pseudo random bits from polynomials
US20090060180A1 (en) * 2007-08-29 2009-03-05 Red Hat, Inc. Method and an apparatus to generate pseudo random bits for a cryptographic key
US8781117B2 (en) 2007-08-29 2014-07-15 Red Hat, Inc. Generating pseudo random bits from polynomials
US20090214024A1 (en) * 2008-02-21 2009-08-27 Schneider James P Block cipher using multiplication over a finite field of even characteristic
US8416947B2 (en) 2008-02-21 2013-04-09 Red Hat, Inc. Block cipher using multiplication over a finite field of even characteristic
US20090220083A1 (en) * 2008-02-28 2009-09-03 Schneider James P Stream cipher using multiplication over a finite field of even characteristic
US7945049B2 (en) 2008-02-28 2011-05-17 Red Hat, Inc. Stream cipher using multiplication over a finite field of even characteristic
US20090292751A1 (en) * 2008-05-22 2009-11-26 James Paul Schneider Non-linear mixing of pseudo-random number generator output
US8560587B2 (en) 2008-05-22 2013-10-15 Red Hat, Inc. Non-linear mixing of pseudo-random number generator output
US8588412B2 (en) 2008-05-23 2013-11-19 Red Hat, Inc. Mechanism for generating pseudorandom number sequences
US20100135486A1 (en) * 2008-11-30 2010-06-03 Schneider James P Nonlinear feedback mode for block ciphers
US8358781B2 (en) 2008-11-30 2013-01-22 Red Hat, Inc. Nonlinear feedback mode for block ciphers
US20130315394A1 (en) * 2012-05-25 2013-11-28 Wistron Corporation Data encryption method, data verification method and electronic apparatus
CN103427987A (zh) * 2012-05-25 2013-12-04 纬创资通股份有限公司 数据加密的方法、数据验证方法及电子装置
US8989385B2 (en) * 2012-05-25 2015-03-24 Wistron Corporation Data encryption method, data verification method and electronic apparatus
TWI489847B (zh) * 2012-05-25 2015-06-21 Wistron Corp 資料加密方法、資料驗證方法及電子裝置
US10536445B1 (en) 2017-06-12 2020-01-14 Daniel Maurice Lerner Discrete blockchain and blockchain communications
US10579793B2 (en) 2017-06-12 2020-03-03 Daniel Maurice Lerner Managed securitized containers and container communications
US10650139B2 (en) 2017-06-12 2020-05-12 Daniel Maurice Lerner Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers
US10764282B2 (en) 2017-06-12 2020-09-01 Daniel Maurice Lerner Protected and secured user-wearable devices for assured authentication and validation of data storage and transmission that utilize securitized containers
US10957445B2 (en) 2017-10-05 2021-03-23 Hill-Rom Services, Inc. Caregiver and staff information system
US11257588B2 (en) 2017-10-05 2022-02-22 Hill-Rom Services, Inc. Caregiver and staff information system
US11688511B2 (en) 2017-10-05 2023-06-27 Hill-Rom Services, Inc. Caregiver and staff information system

Also Published As

Publication number Publication date
JPH05500121A (ja) 1993-01-14
WO1991018459A2 (de) 1991-11-28
EP0482154B1 (de) 1993-06-30
ES2042346T3 (es) 1993-12-01
JP3225440B2 (ja) 2001-11-05
WO1991018459A3 (de) 1992-03-05
EP0482154A1 (de) 1992-04-29
HK1003338A1 (en) 1998-10-23

Similar Documents

Publication Publication Date Title
US5214703A (en) Device for the conversion of a digital block and use of same
US4351982A (en) RSA Public-key data encryption system having large random prime number generating microprocessor or the like
EP0635956B1 (en) Encryption apparatus, communication system using the same and method therefor
KR100296958B1 (ko) 블록 데이터 암호화 장치
US5365588A (en) High speed encryption system and method
US5365589A (en) Method and apparatus for encryption, decryption and authentication using dynamical systems
US20070195948A1 (en) Method and device for the encryption and decryption of data
CN100382485C (zh) 设计最优加密函数的方法和优化的加密设备
Rouvroy et al. Efficient uses of FPGAs for implementations of DES and its experimental linear cryptanalysis
CN107294720A (zh) 一种素域Fp下的SM2椭圆曲线公钥加密算法的硬件实现系统
JPH0527291B2 (ja)
EP1059760A1 (en) Method for the block-encryption of discrete data
Gammel et al. The Achterbahn stream cipher
US5068895A (en) Encryption and decryption methods using bit-length preservation decryptor
JPH0736672A (ja) 乱数発生器、及びそれを用いた通信システム及びその方法
JPH0738558A (ja) 暗号化装置、及びそれを用いた通信システム及びその方法
US6337910B1 (en) Method and apparatus for generating one time pads simultaneously in separate encryption/decryption systems
JP3202544B2 (ja) 暗号通信装置及び暗号化装置
EP0399587A1 (en) Method for enciphering a series consisting of at least one symbol
JPH0736673A (ja) 乱数発生器、及びそれを用いた通信システム及びその方法
JPS6259437A (ja) 暗号化方式
JPH10153955A (ja) 暗号装置
Guerreiro et al. A neural key generator for a public block cipher
CN114448604A (zh) 混合式平行运算加解密系统、发射端装置以及接收端装置
JPH0916679A (ja) 暗号通信装置及び暗号通信システム

Legal Events

Date Code Title Description
AS Assignment

Owner name: ASCOM TECH AG, SWITZERLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:MASSEY, JAMES L.;LAI, XUEJIA;REEL/FRAME:006128/0503

Effective date: 19911017

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: NAGRAVISION S.A., SWITZERLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ASCOM (SCHWEIZ) AG;REEL/FRAME:018711/0301

Effective date: 20060908